1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zheka24 [161]
3 years ago
13

Files and e-mail messages sent over the Internet are broken down into smaller pieces called _____.

Computers and Technology
1 answer:
Fynjy0 [20]3 years ago
6 0
Files and email messages sent over the internet are broken down into smaller pieces called packets
You might be interested in
write a C program that declares an integer variable called "favorite_number". The program should then prompt the user to enter t
Arturiano [62]

Answer:

// here is code in C.

// headers

#include <stdio.h>

// main function

int main(void) {

// variable declaration

int favorite_number;

 // ask user to enter favorite number

printf("enter your favorite number : ");

 // read the number

scanf("%d",&favorite_number);

 // print the message

printf("your favorite number is: %d",favorite_number);

return 0;

}

Explanation:

Declare a variable "favorite_number" of integer type.Ask user to enter favorite number and assign it to favorite_number.Then print the message which include the favorite number.

Output:

enter your favorite number : 77

your favorite number is: 77

4 0
3 years ago
(photoshop cc)
iren2701 [21]
Black Point<span> Compensation option </span>controls whether to adjust for differences in black points when converting<span> colors </span>between color spaces<span>.

A is the answer :)

</span>
5 0
3 years ago
Many say that computers are changing learning as radically as did printing in its age. how are computer technologies changing le
Iteru [2.4K]
Computers are broadening horizons of learning and cutting back on limitations. practically all the knowledge of the worls is only a few clicks away

7 0
3 years ago
Arpenet was the computer created by the military true or false
Sphinxa [80]

True. It was a project that the pentagon was working on in the 60's

3 0
3 years ago
What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view
Lorico [155]

Answer:

Constrained user interfaces is the correct answer to the following question.

Explanation:

Because Constrained user interfaces are the secured function that is used for controlling the access of the user to the computer system and also confines the user to access the data but they can access only that data for which they are not restricted. In other words, Constrained user interfaces is that type of restriction for those users who access your data or resources and they can access only that part of data for which they are allowed.

4 0
3 years ago
Other questions:
  • True/False
    11·1 answer
  • What is the main storage device where the computer stores data?
    15·1 answer
  • If I wanted to include a picture of a dog in my document, I could use _____. SmartArt WordArt clip art AutoCorrect
    13·1 answer
  • Part 2: a) Write VHDL code for a top module that invokes necessary components to display the four decimal digits on four seven-s
    5·1 answer
  • Demonstrate the register addressing mode for the following instructions. Also what addressing mode belongs to these instructions
    11·1 answer
  • AP CSA help needed. Java please.
    11·1 answer
  • What is a computer please tell me ​
    10·2 answers
  • What is the simplest form of backing up data?
    10·1 answer
  • What is the digital revolution and how did it change society?
    14·1 answer
  • A block signature indicating that a text message was typed on a mobile device is an example of ____________.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!